Cisco Blogs


Cisco Blog > Partner

Global Partner Marketing Blog Series Kicks Off

I’d like to welcome you to my new Global Partner Marketing (GPM) blog series. As vice president of Cisco’s GPM organization, I’m excited about our broad partner ecosystem and the goals we can accomplish together. This new blog will feature all the latest perspectives on Revenue Marketing; upcoming partner program launches including how to market the Internet of Everything (IoE); partner tools and resources; partner events; how to evolve and profit as Cisco continues the journey to being the number one IT company and much more!  Read More »

Tags: , , ,

The Fifth Step to Enterprise Mobility: Defending Your Data

This is the fifth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post discussing how to build a mobile structure can be found here. The second blog post highlighting the benefits going virtual can be found here. The third blog post focused on preparing enterprises for the division of devices can be found here. The fourth blog post focused on creating an app checkpoint can be found here

In a 2012 survey of IT executives and CEOs, nearly half of the companies that permit mobility and BYOD reported experiencing a data or security breach as a result of an employee-owned device accessing the corporate network. In addition, security concerns continue to remain a key issue for decision makers looking to deploy additional mobile solutions such as enterprise mobile apps, according to a recent article from IT Pro.

Careful planning can help enterprises manage security concerns and harness the power of mobility. Here’s a brief checklist to help organizations secure devices, data and the network:

Watch the video: http://youtu.be/k8ytncvjE7M

Watch the video: http://youtu.be/k8ytncvjE7M

1. IT Pushing of Capability Down to End Devices

 IT needs to be able to push capabilities down to end devices and access control for both on-premises and off-premises apps, while providing pull capabilities for users, so they can self-provision apps.

IT must have the ability to apply situational control policies (for example, for disabling cameras on mobile devices in order to protect on-premises company assets when employees and guests are on corporate premises or in restricted areas). Another must have? The ability to remotely locate, lock, and wipe devices should there be a theft or if an employee leaves the company. It is also essential to be able to automate geo-specific policies to control roaming costs when workers are out of country. Read More »

Tags: , , , , , , , , , , ,

What’s Next for the Internet of Everything and Cities?

Today’s cities are experiencing the emergence of a new imperative from public leaders and industries. “Digital urbanism” is rapidly becoming a central pillar for urban planners, architects, developers, and transportation providers, as well as in public service provision.

From a public leadership perspective, cities can be viewed as microcosms of the interconnected networks that make up the Internet of Everything (IoE). In fact, cities serve as “fertile ground” for realizing value from IoE.

Read More »

Tags: , , , , , ,

August 2013 #SecureDC Twitter Chat Recap: SDN Security

Our first SecureDC twitter chat created some great industry dialog around security for Software Defined Networks (SDN) as well as using SDN to improve security. SDN is going through a similar hype cycle as seen with cloud and we feel that it’s important to focus more on education now and broader collaboration, so that users can benefit from the tremendous potential SDN holds.

More Education, Less Buzz

We kicked off our conversation by asking what are the most pressing issues around SDN were. @Joltsik, Principal analyst at Enterprise Strategy Group, felt that users are confused with so much buzz, yet there’s little in the way of education.

@Raj_Samani, Chief Innovation Office at the Cloud Security Alliance and CTO at McAfee, went one step further indicating that greater transparency is also needed. However, @Jgreene3rd, Technical Lead for Data Center Security Technologies at Intel, noted that the upside of buzz is that it drives greater demand for availability, which in turn fuels education.

JonOltsik.jpeg

 

 

 

 

 

SDN and Improving Security

@KenSBeck, Principal Engineer at the Cisco Security Technology Group Office of the CTO, led an interesting discussion on how APIs for programming the network at network speed will allow security intelligence to be much more dynamic and eventually part of the network itself. @shl_eax_1, Technical Lead Engineer at Cisco Security Technology Group Office of the CTO, further noted how global visibility of the network hastens the speed with which security issues get resolved.

@fsmontenegro elaborated on how SDN security can enable more intelligent, granular and efficient response, and that SDN improves security by adding policy exceptions at the network layer with redirect flow. @vernonxt, SVP for ICT Research at IDC, honed in on SDN enabling better policy management. @AndiMann, Vice President at CA Technologies, speculated with automation enabling embedded policy and preventing random changes, shouldn’t SDN be able to do the same.

SDN Impact on Regulatory Compliance

@alokmittal65, Chief of Staff for the Cisco Security Technology Group Office of the CTO, stressed the need for auditing, logging and monitoring of policy change events.

@Raj_Samani also noted that with greater proliferation of devices, the ability to achieve greater attestation on the endpoint becomes more challenging. @KenSBeck drew attention to leveraging network awareness of user, geo location, and device as contextual elements that can make attestations much more meaningful.

Wrapping Up

@KenSBeck, our host from the Office of the CTO at Cisco, closed with words of advice and a hint of what is in store.

KenBack

 

 

 

 

 

 

 

Keep the dialog going! Follow us on @Secdatacenter #SecureDC and join the conversation on LinkedIn Secure Datacenter Trends. For additional SDN resources, be sure to register today for our SDN Learning Seminars.

 

Tags: , , ,

Evolving Cisco’s Unified Computing System for Big Data and the Internet of Everything

Evolving Cisco UCS for Big Data and the Internet of Everything

Image credit: imediaconnection.com

In an earlier blog, I discussed the incredible success behind the Cisco Unified Computing System (UCS) in Darwinian evolutionary terms.  Since I wrote that blog three months ago, we’ve continued to grow rapidly and have strengthened our position as the #2 blade server player worldwide from 19.3% to 21.5% revenue share (per IDC 2CQ2013 server market tracker, September 2013), with 33.9% revenue share in the US.

Prediction – The #1 spot is well within our reach sooner than you may think.

As we grow our installed base with roughly 1,000 new customers every month, our conversations about the future of UCS have taken an interesting turn. Until now in what I’ll call the “UCS 1.0” phase, Cisco focused on virtualization and private cloud as the dominant use cases that were top-of-mind for industry CIOs and we struck a resonant chord based on our growth – just look at our numbers.

We were market makers with expanded-memory 2-socket Intel EX blades (remember the B230’s?), which were gobbled up like candy into large-scale VDI deployments much to the surprise of the industry. We also jump-started a very attractive RISC-to-x86 migration practice, including Cisco IT’s own production environment: a 40TB mission-critical database that ran on HP Superdomes – a “circle of life” moment for me since Superdome was my program from 1999-2003.

We’ll continue leading in customer value for our original design centers, but we are now focusing on market expansion with what we call “UCS 2.0”, expanding into data-intensive, mission critical, analytics and service provider cloud environments with an increased level of R&D funding and strong corporate support from our top executives.

Prediction – You’ll see us more focused on architectural solutions for key industry vertical markets with tuned solution environments that leverage Cisco’s wide portfolio and that of our partners.

One such act of support is the announcement today of our intent to acquire WHIPTAIL, a leading solid-state systems company that boasts the highest scalability in performance and capacity of any scale-out flash vendor on the market today.  WHIPTAIL systems span from single-node entry products to 30-node behemoths that drive almost 400TB’s of flash, 40GB/sec of bandwidth and 4 million random R/W IOPS – for starters.

Prediction: Cisco will unseat Infiniband with low-latency Ethernet fabrics. Check out our USNIC technology for starters…

In our customer interactions it became very clear they view application acceleration using persistent solid-state memory as a use case that belongs in the server tier, not the storage tier.

In an application-centric world, we started thinking not about server vs. storage infrastructure, but how applications viewed data – hot “important right now” data, warm “may be of interest data” and cold “let’s keep it around for background mining or compliance” data.

We arrived at the conclusion that UCS needed to be best-in-class at accelerating hot data layers. Hot data is closest to applications and therefore has high affinity for the server tier.  Hence WHIPTAIL.

Assertion: Flash is a “boundary technology” that can be viewed as part of the memory or storage hierarchy. With respect to storage it’s faster and more expensive per GB. With respect to DRAM memory it’s slower but cheaper per GB. It therefore allows cost/performance arbitrage for applications by applying an accelerated persistent data model that can save on DRAM and de-complicate underlying permanent backing stores.

WHIPTAIL is a great fit with the fabric computing UCS architecture and also complementary to our C-Series rack mount servers and our SingleConnect capability in our UCS Manager that allows mixed-density blade/rack deployments to be managed from a common pane of glass.

Our intent is to fully integrate UCS computing and WHIPTAIL solid-state technologies over a Nexus fabric to create scalable persistent memory systems. That’s our vision.

Why? Because customers will be able to do things they could not before. Such as loading vast amounts of data in seconds and minutes, not hours or days – or – shrinking their performance footprint to a rack vs. 30 racks – or – accelerating Hadoop on all solid-state infrastructure – or – extending in-memory analytics to a scale previously not thought possible. That’s why.

As converged infrastructure advances as an ensemble computing architecture, boundary technologies like solid-state memory can be viewed as part of the memory or the storage hierarchy. Cisco’s point of view is to make it part of the memory hierarchy in the compute tier. That allows customers the best of both worlds – performance acceleration for applications while retaining their investment in permanent backing stores and simplifying their overall data center total cost of ownership (TCO).

To close on a Darwinian note, if UCS existed in the Cretaceous Period it would have been a Velociraptor  (meaning ‘swift seizer’)– sleek, fast and ferocious – eating everything in its path.  Velociraptors are believed to have hunted in packs, which is great considering the strong partner ecosystem that Cisco and UCS have built with industry leaders like EMC, NetApp and VCE as shining examples. We are committed to maintaining and expanding our hunting pack – more on that later!

if Cisco UCS existed in the Cretaceous Period it would have been a Velociraptor

if Cisco UCS existed in the Cretaceous Period it would have been a Velociraptor. Image credit: dark.pozadia.org

Tags: , , , , , , ,